Compliance & Regulations
What Is CMMC?
The Cybersecurity Maturity Model Certification (CMMC) Program is a mandatory U.S.
The Cybersecurity Maturity Model Certification (CMMC) Program is a mandatory U.S. Department of Defense (DoD) initiative that verifies defense contractors and subcontractors have implemented required security measures to safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). CMMC 2.0, the current version, mandates third-party assessments and certifications verifying compliance with 110 cybersecurity controls from NIST SP 800-171A (Level 2) or 134 controls including NIST SP 800-172A (Level 3).
How Does CMMC Work?
CMMC operates through a three-level framework that establishes certification requirements based on the sensitivity of information handled by defense contractors.
CMMC 2.0 Three-Level Framework
Level 1 (Foundational) addresses basic cyber hygiene for organizations handling Federal Contract Information only. This level requires 17 foundational controls focused on basic cybersecurity practices, primarily limiting access to authorized users and providing basic protection of contractor information. No third-party assessment is required; organizations can self-assess or undergo government assessment according to DoD CIO guidance on CMMC from 2024.
Level 2 (Advanced) represents the most common and critical level for Defense Industrial Base organizations. This level applies to organizations handling Controlled Unclassified Information and requires implementation of all 110 security practices and controls from NIST SP 800-171 Rev. 2. These controls are grouped into 14 security domains and include 320 specific security objectives. Third-party assessment by Certified CMMC Professional Assessment Organizations (C3PAOs) is required, with certifications valid for three years and annual affirmation of continuous compliance according to Federal Register documentation on the CMMC program from October 2024.
Level 3 (Expert) addresses enhanced protection for organizations handling highly sensitive information. This level requires all 110 NIST SP 800-171 controls plus 24 additional cybersecurity requirements from NIST SP 800-172. Third-party assessment is required with three-year certification validity and more rigorous evaluation of advanced security practices.
Assessment and Certification Process
C3PAO assessments for Level 2 and Level 3 are conducted by independent Certified CMMC Professional Assessment Organizations that evaluate the organization's implementation of required controls. Assessment results are entered into the CMMC Enterprise Mission Assurance Support Service (eMASS), which automatically transmits results to the System for Award Management (SPRS) according to DoD CIO CMMC Assessment Guide for Level 2 from 2024.
For Level 2 only, organizations may conduct self-assessments based on NIST SP 800-171A with scores posted in SPRS. However, self-assessment does not replace C3PAO assessment for final certification.
Organizations must achieve a minimum score of 88 representing 80 percent compliance. Assessments remain valid for three years, with annual affirmation required to confirm continued compliance. Post-assessment, organizations must provide evidence of continuous compliance according to Summit 7 CMMC Level 2 Compliance Guide from 2024.
Control Domains from NIST SP 800-171
The 14 control families that underpin CMMC Level 2 include Access Control, Awareness and Training, Audit and Accountability, Configuration Management, Identification and Authentication, Incident Response, Maintenance, Media Protection, Personnel Security, Physical and Environmental Protection, Risk Assessment, Security Assessment, System and Communications Protection, and System and Information Integrity according to Scrut.io documentation on the 14 control domains from 2024.
Each control family contains specific security requirements addressing different aspects of information system security.
How Does CMMC Differ from Previous Versions and Related Standards?
CMMC has evolved significantly from version 1.0 to 2.0, with important differences from the underlying NIST 800-171 standard, as shown in the following comparison:
Aspect | CMMC 1.0 | CMMC 2.0 | NIST 800-171 Alone |
|---|---|---|---|
Levels | 5 levels | 3 levels | N/A (standard only) |
Level 2 Controls | 171 practices | 110 practices | 110 practices |
Assessment Focus | Process maturity | Control implementation | N/A |
Third-Party Required | Yes, all levels | Levels 2-3 only | Not required |
Cost (Level 2 assessment) | Higher | $20,000-$50,000 | N/A |
Timeline to Compliance | 1-3 years | 1-2 years | Organization-dependent |
Applicability | DIB contractors | DIB + FCI contractors | General federal requirement |
Market Adoption | Discontinued | Full mandate by 2027 | Foundational standard |
Source: Centraleyes, CMMC v2.0 vs NIST 800-171, 2024; Strike Graph, CMMC 2.0 Requirements Complete Guide, 2024
CMMC 1.0 included five certification levels with 171 practices at Level 2, focusing on process maturity assessment. CMMC 2.0 streamlined the framework to three levels with 110 practices at Level 2, focusing on control implementation rather than process maturity. While NIST 800-171 alone establishes the security requirements, CMMC adds mandatory third-party verification and certification requirements.
Why Does CMMC Matter?
CMMC has become critical for defense contractors as the DoD implements mandatory certification requirements across the entire defense supply chain.
Phased Rollout Timeline
The final CMMC rule was published October 15, 2024 and became effective December 16, 2024. The program implements through four phases over three years beginning November 10, 2025 according to Federal Register documentation from October 2024.
Phase 1 started November 10, 2025 with DFARS clause 252.204-7021 included in new solicitations. Phases 2 through 4 continue through 2027 with escalating compliance requirements. The final deadline requires all new and existing DoD contracts to achieve full compliance by 2027 according to Inside Government Contracts analysis from September 2025.
Scale of Impact
An estimated 300,000 or more defense contractors and subcontractors are affected by CMMC requirements. C3PAO training and accreditation are ongoing as the program builds assessment capacity. Industry preparation focused on self-assessments in 2026, with third-party assessments accelerating in 2027 and beyond.
First-year DoD procurement costs are estimated at approximately $3 billion, with significant additional contractor implementation costs according to Federal Register cost estimates from October 2024.
Supply Chain Requirements
The CMMC requirement flows down the entire defense supply chain. Prime contractors are responsible for verifying and maintaining subcontractor compliance, creating cascading certification requirements that extend to small businesses and specialized suppliers throughout the Defense Industrial Base.
What Are the Limitations of CMMC?
CMMC faces several implementation challenges that affect contractors across the defense supply chain.
Transition Complexity
Organizations moving from CMMC 1.0 must adapt to the new three-level model and 110-control structure. The shift from process maturity focus to control implementation requires changes in how organizations approach compliance and documentation. Organizations that invested in CMMC 1.0 certification must re-evaluate their security programs against the new framework.
Cost Barriers
Third-party C3PAO assessments cost between $20,000 and $50,000 or more, creating significant financial burden especially for small and mid-sized contractors. These assessment costs are in addition to implementation costs for required security controls, which can run substantially higher depending on the organization's current security posture according to Crowell & Moring analysis from 2024.
Regulatory Uncertainty During Phased Rollout
The phased rollout creates ambiguity about exact compliance deadlines for existing contracts. Organizations must track which phase applies to their specific contracts and plan certification timing accordingly. The transition from DFARS 252.204-7012 (NIST 800-171 compliance) to DFARS 252.204-7021 (CMMC requirements) creates uncertainty about enforcement priorities during the interim period.
Subcontractor Cascade Effects
The requirement flows down the supply chain, meaning small companies that are subcontractors or sub-subcontractors may lack resources for compliance. These smaller organizations face the same control requirements and assessment costs as large defense contractors, creating disproportionate burden relative to their contract values and organizational resources.
Assessment Capacity Limitations
Limited numbers of trained C3PAOs early in implementation create assessment backlogs. As thousands of contractors seek certification simultaneously during 2026 and 2027, assessment scheduling and capacity become critical constraints. Organizations must plan certification timelines well in advance to secure assessment slots according to industry analysis from 2024.
Legacy System Compatibility
Organizations with legacy systems struggle to implement modern controls including multi-factor authentication, encryption, and advanced audit logging. These systems may require substantial upgrades or replacement to meet CMMC requirements, creating technical debt that must be resolved before certification.
NIST 800-171 Version Confusion
NIST SP 800-171 Revision 3 was released in May 2024, but DoD still requires Revision 2 compliance via Class Deviation. This creates confusion about which version applies and when organizations should plan for transition to Revision 3 requirements according to Crowell & Moring analysis from 2024.
How Does CMMC Relate to Regulatory Requirements?
CMMC operates within a comprehensive regulatory framework established by the Department of Defense and implemented through federal acquisition regulations.
Regulatory Framework
The establishing authority for CMMC is the U.S. Department of Defense, Office of the Chief Information Security Officer, with statutory basis in National Defense Authorization Act (NDAA) provisions. Implementation occurs through Defense Federal Acquisition Regulation Supplement (DFARS) clauses.
The primary DFARS clauses include 252.204-7021 addressing CMMC requirements for Phase 1 contractors and 252.204-7012 addressing compliance with NIST SP 800-171 as the current baseline. Assessment standards derive from NIST SP 800-171A providing assessment procedures for Level 2. Oversight is provided by the DoD CIO and CMMC Accreditation Body (CAB), with enforcement authority to terminate contracts, suspend contractors, or pursue debarment for non-compliance according to Federal Register documentation from October 2024.
DFARS Implementation Timeline
Current pre-2026 contracts use DFARS 252.204-7012 requiring NIST 800-171 compliance, with self-assessments allowed until the transition period ends. Phase 1 beginning November 10, 2025 includes DFARS 252.204-7021 in new solicitations, requiring contractors to self-assess or undergo C3PAO assessment. Phases 2 through 4 during 2026-2027 establish escalating requirements for existing contracts with full third-party assessment mandates.
Federal Contract Information and Controlled Unclassified Information
CMMC applies to organizations handling two categories of sensitive but unclassified information. Federal Contract Information (FCI) is information not classified but directly related to DoD contracts. Controlled Unclassified Information (CUI) is information the government has identified as needing protection, including technical data, export control information, and controlled technical data according to DoD CIO CMMC Program Overview from 2024.
The distinction between FCI and CUI determines which CMMC level applies, with FCI requiring Level 1 and CUI requiring Level 2 or Level 3 depending on sensitivity.
FAQs
Is CMMC Level 2 the same as NIST 800-171 compliance?
Functionally yes for controls, as both require implementation of the 110 NIST SP 800-171 controls. However, CMMC Level 2 also requires third-party C3PAO assessment and certification to validate compliance. NIST 800-171 alone is a standard establishing security requirements; CMMC adds the verification requirement through independent assessment. Organizations cannot claim CMMC Level 2 certification based solely on self-assessed NIST 800-171 compliance.
When must my organization achieve CMMC certification?
The phased rollout begins November 10, 2025 for Phase 1, with full compliance deadline in 2027. Specific deadlines depend on your contract type and which implementation phase applies. Check DFARS clauses in your contract for exact requirements. New contract solicitations issued after November 10, 2025 include CMMC requirements, while existing contracts transition during Phases 2 through 4.
What is the difference between Level 2 Self and Level 2 C3PAO assessment?
Level 2 Self-assessment is conducted internally by the organization with results posted to SPRS. Level 2 C3PAO assessment is conducted by independent certified assessors and provides third-party verification of control implementation. Both require a minimum score of 88 out of 100, but only C3PAO assessment provides CMMC certification. Self-assessment may be used as an interim measure but does not replace the C3PAO requirement.
Do subcontractors need to be CMMC certified?
Yes, if they handle CUI or FCI. Subcontractors must achieve appropriate CMMC certification based on the information they handle. Prime contractors are responsible for verifying and maintaining subcontractor compliance. This creates a cascading requirement throughout the defense supply chain, with each tier of contractors and subcontractors requiring certification commensurate with the information they access.
What happens if we fail CMMC assessment?
Organizations can remediate identified deficiencies and retest. The assessment must achieve a minimum score of 88 out of 100 for compliance. Failure on first attempt does not automatically disqualify the organization but requires demonstrated corrective action addressing all findings. Organizations should plan for potential remediation time when scheduling assessments relative to contract deadlines.



